PT-2025-31705 · Traefik · Traefik

Odaysec

·

Published

2025-08-01

·

Updated

2025-08-02

·

CVE-2025-54386

CVSS v4.0
7.3
VectorAV:N/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L

Name of the Vulnerable Software and Affected Versions:

Traefik versions 2.11.27 and below

Traefik versions 3.0.0 through 3.4.4

Traefik version 3.5.0-rc1

Description:

Traefik is an HTTP reverse proxy and load balancer. A path traversal vulnerability exists in the WASM Traefik’s plugin installation mechanism. Supplying a maliciously crafted ZIP archive containing file paths with `../` sequences allows an attacker to overwrite arbitrary files on the system outside of the intended plugin directory. This can lead to remote code execution (RCE), privilege escalation, persistence, or denial of service.

Recommendations:

Update to Traefik version 2.11.28 or later.

Update to Traefik version 3.4.5 or later.

Update to Traefik version 3.5.0 or later.

Fix

RCE

LPE

DoS

Path traversal

Weakness Enumeration

Related Identifiers

CVE-2025-54386
GHSA-Q6GG-9F92-R9WG

Affected Products

Traefik